期刊文献+

利用节点可信度的安全链路状态路由协议 被引量:9

Secure link status routing protocol based on node trustworthiness
下载PDF
导出
摘要 针对当前互联网中亟需解决的安全路由技术展开研究,在综合考虑节点身份和交互行为的基础上,引入一种基于动态贝叶斯网络的可信度量模型,将此模型应用于开放式最短路径优先路由协议,同时结合基于组合公钥的安全认证技术,提出了一种新的安全链路状态路由协议,能够为信息传输选择高安全可信的路径.仿真实验通过模拟拒绝服务攻击,验证了在同等条件下新安全链路状态路由协议在增强安全可信性的同时,并未显著增加协议的开销和复杂性,且在遭受网络攻击时具有较好的时效性和动态自适应能力,能够有效抑制异常实体的威胁. To develop secure routing technology for the current Internet, a trusted measurement model based on dynamic Bayesian networks (TMMDBN) is introduced by taking both node identity and its interaction into account. Combining the security authentication technology based on the combined public key (CPK), a new secure link state routing protocol(SLSRP) is proposed by applying the model to the OSPF protocol, which can determine a high security and trusted path for data transinission. Simulation results show that SLSRP achieves a much better security performance than OSPF with little increase in signaling overhead and computational complexity. Moreover, SLSRP has an adaptive capability and can quickly react to the denial of the service attack, which can effectively suppress the threat of an abnormal entity.
作者 梁洪泉 吴巍 LIANG Hongquan WU Wei(Science and Technology on Information Transmission and Dissemination in Communication Networks Laboratory, Shijiazhuang 050081, China The 54th Research Institute of China Electronics Technology Group Corporation, Shijiazhuang 050081, China)
出处 《西安电子科技大学学报》 EI CAS CSCD 北大核心 2016年第5期121-127,共7页 Journal of Xidian University
基金 国家部委基金资助项目(B1120131046) 国家高技术研究发展计划("863"计划)资助项目(2015A015701)
关键词 可信度量 动态贝叶斯网络 组合公钥 可信平台模块 网络安全 trusted measurement Bayesian networks combined public key trusted platform module network security
  • 相关文献

参考文献6

二级参考文献133

  • 1张焕国,赵波.可信计算[M].武汉:武汉大学出版社,2011:33-35.
  • 2Trusted Computing Group TCG Trusted Network Connect TNC Ar- chitecture for Interoperability Specification Version 1.2[S]. 2007.
  • 3Cisco Systems, Inc network admission control introduction[EB/OL]. http://www.cisco.com/en/US/netsol/ns466/networking solutions._pack age.html, 2007.
  • 4Microsoft Corporation. Introduction to network access protection[EB/OL]. http://technet.microsoft.com/en-us/network/cc984252, 2008.
  • 5ALMENAREZ F, MARIN A, DIAZ D. Developing a model for trust management in pervasive devices[A]. Proc of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (PerSee 2006)[C]. Washington DC, USA, 2006. 267-272.
  • 6MELAYE D, DEMAZEAU Y. Bayesian dynamic trust model[A]. LNCS 3690[C]. Berlin: Springer-Verlag, Germany, 2005.480-489.
  • 7FENG R J, XU X F, ZHOU X. A trust evaluation algorithm for wire- less sensor networks based on node behaviors and D-S evidence the- ory[J]. Sensors, 2011, 11:1345-1360.
  • 8BHAVNA G, HARMEET K, NAMITA. Trust based access control for grid resources[A]. International Conference on Communication Systems and Network Technologies[C]. Jammu, India, 2011,678-682.
  • 9SUN Y, YU W, HAN Z. Information thorctic framework of trust modeling and evaluation for ad hoc networks[J]. IEEE Journal on Se- lected Areas in Communications, Selected Areas in Communications, 2006, 249(2):305-319.
  • 10MARSH S. Formalising Trust as a Computational Concept[D]. Stir- ling: University of Stirling, 1994.

共引文献59

同被引文献46

引证文献9

二级引证文献32

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部